
How to investigate alerts in Microsoft Azure with SOAR
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More

How to investigate alerts in Microsoft Azure with SOAR
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More

Investigate alerts in Microsoft Azure
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More
Hey InfoSec, what are you doing to protect your DevOps Team?
DevOps, serverless applications and containers are just a few of the latest advancements in a developer's toolbox. For development teams, this means that the time to market (TTM) is faster—especially for Agile teams. So, how and what are security operations teams doing to ensure that security is keeping pace with ... Read More

Understanding APIs: SOAP
In my previous post, I talked about the basics of REST (representable state transfer) APIs (application programming interfaces). If you haven't read it yet, I highly recommend you read that post before continuing. In this post, we will be talking about the basics of simple object access protocol (SOAP) APIs, ... Read More

Understanding APIs: SOAP
In my previous post, I talked about the basics of REST (representable state transfer) APIs (application programming interfaces). If you haven't read it yet, I highly recommend you read that post before continuing. In this post, we will be talking about the basics of simple object access protocol (SOAP) APIs, ... Read More

Swimlane & Cylance PROTECT: Endpoint Threat Response
Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More

Proactive Endpoint Threat Response with Swimlane & Cylance PROTECT
Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More

Swimlane & Cylance PROTECT: Endpoint Threat Response
Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More
Understanding APIs: REST
Security orchestration, automation and response (SOAR) platforms rely heavily on APIs (application programming interfaces) to drive orchestration of disparate security tools (products) and invoke desired responses in the form of actions. Besides SOAR products, APIs are commonplace among almost all services, tools, and products used by technical workers. Even though ... Read More